Distributed Denial of Service attacks - DDoS. They used to be nuisance crimes committed by gaming rivals and script kiddies. The stakes grew higher five years ago, with the rise of hacktivism and high-profile attacks on large U.S. banks. But even those attacks are minor when compared with today's huge, IoT...

Today's most advanced threat actors - whether external or internal - are stealthier than ever and able to hide within one's systems for days, weeks, even months as they gather intel and prepare to strike. How prepared is your security organization to respond to these attackers? Is yours a proactive security posture...

In today's shape-shifting threat landscape, every organization needs the same thing: Real-time, actionable threat intelligence. And there is no shortage of intelligence feeds from reputable third-party sources. But are there too many intelligence feeds for systems and analysts to process? How effectively is actionable...

Are you an effective security leader with a finger on the pulse of today's evolving threats? Is your hand tightly on the reins of a risk-savvy security team? Do you have a foot in the door of the boardroom, where your counsel is taken seriously?
Or are you simply being led around from crisis to crisis, your hands...

Ransomware dominated the headlines in 2016, as organizations of all sizes and sectors fell victim to malware that locked down, encrypted - and in some cases threatened to destroy - critical systems and data. But is ransomware truly as big a security challenge as it is a compelling story? And what lessons have...

The Healthcare Information Security Today survey is a comprehensive study that measures progress toward ensuring the privacy and security of healthcare information as more records are digitized and shared, and as new cyberthreats emerge and evolve.

In 2015, it's time to revisit information security leaders and gauge not just the deep impact of these breaches, but the state of global organizations to prepare for and respond to such devastating attacks. How well fortified are organizations to prepare for and respond to the inevitable? Are their security programs...

Since 2013, global organizations of all sectors and sizes have grappled with a new wave of distributed denial of service attacks that at best have been a nuisance, at worst have served as distractions so cyber-criminals could commit fraud. DDoS defenses have improved, but the attacks continue to evolve in scale and...

Global enterprises long ago discovered the business benefits of mobility, and now sophisticated criminals are moving into the space with a broad range of new threats. How prepared are you to defend your organization's data?

As mobile threats have evolved, so has mobile security. What used to be the benchmark - mobile device management - today is merely the baseline. While organizations develop mobile security maturity, they enhance not just device security, but also content, application and transaction security. Where does your...

In our increasingly mobile society, organizations, their employees, partners and customers are at greater than ever risk of identity theft and fraud. How prepared are organizations to mitigate these risks? This survey helps establish the new benchmark.